Skip to main content

Networking

Trojan programs improve attack methods

posted onNovember 6, 2001
by hitbsecnews

Source: Vnunet

Security watchers have warned that Trojan programs, feared for their ability to compromise a network and go unnoticed, are getting sneakier about sending data out of the network. Typically, Trojans sit on a compromised machine and wait for incoming connections to deliver instructions.

But this leaves a flaw in the Trojan's functionality: all unnecessary ports can be blocked so that incoming connections are dropped and the Trojan is rendered useless.

The Internet Is an Open Book - Protect Yourself with Secure Protocols

posted onNovember 2, 2001
by hitbsecnews

Source: OS Opinion

Entering a password into an e-mail program does not mean that e-mail is secure when traveling through the Internet.

In this age of viruses, hacking, terrorism and paranoia, people are becoming more and more interested in finding ways to protect themselves and keep their data private on the Internet and elsewhere. The unfortunate thing is that few people are aware that they are passing their personal information back and forth over the Internet in the clear for anyone to intercept.

The 60 Minute Network Security Guide

posted onNovember 2, 2001
by hitbsecnews

This SNAC Guide addresses security "best practices" from the National Security Agency's Systems and Network Attack Center. It includes information on security policies, passwords, host security, buffer overflows, rootkits, and more.

Check it out here.

Hackers shift DoS attack tactics

posted onNovember 1, 2001
by hitbsecnews

Source: Vnunet

The Computer Emergency Response Team (Cert) co-ordination centre reported last week that the targets of denial of service (DoS) attacks are changing, and are becoming more sophisticated and damaging.
According to Cert, early DoS attacks overloaded web servers with simple tools that generated and sent packets of information to a single destination.

But attacks are now increasingly likely to involve large numbers of packets, from single or multiple sources, against multiple targets.

New Nimda variant hits Net, users urged to patch

posted onNovember 1, 2001
by hitbsecnews

Source: CNN

L33tdawg: I think this might be the virus that has been affecting a mate of mine, Jooz. He was telling me the other day that his machine has been infected with some weird ass virus, and last night he called me, frantic over the fact that his machine was totally trashing about and he couldn't seem to fix it... Has anyone else come in contact with this new variant?

Public ICQ Servers Based DDoS

posted onOctober 31, 2001
by hitbsecnews

Source: SecuriTeam

L33tdawg: Not sure if you guys have read about this yet, but I certainly haven't... Word to Jefiwi for sending me the hook up.

It is possible to use public ICQ servers for traffic multiplication with coefficient of 100 and even greater. This means what attacker with a channel bandwidth of 38 Kbps ideally can fill an uplink of 3.8 Mbps.

As it is known ICQ uses the UDP protocol as its transport layer. Data area of each client-side UDP packet starts with the following header, as of ICQ protocol version 5: